Silence Not Golden: Fixing the Mute Button on Tetragon Logs

In my previous From Reactive to Proactive: Transforming Security with Tetragon post, I got Tetragon installed and working. After doing some digging, I found that I was only generating events and logs for one of the k8 nodes in my cluster. This article focuses on how I noticed this and how to fix tetragon logging issues. Identifying That I Had a Logging Issue While poking around at the logs and events from Tetragon, I noticed that I wasn’t getting logs and events from all of my pods....

January 21, 2024 · 3 min · Scott

From Jargon to Genius: Cracking the Code of SPF & DKIM DNS Records

After writing my DMARC Reports: Your Secret Weapon Against Domain Fraud (And How to Read Them) post, I realized that I hadn’t really looked at SPF and DKIM records too much. I had read how you could be protecting your brand from email spoofing with SPF and DKIM records but hadn’t explored them very much. I figured that it made more sense to dig a little deeper into what SPF and DKIM records are as well as how they work....

January 5, 2024 · 6 min · Scott

DMARC Reports: Your Secret Weapon Against Domain Fraud (And How to Read Them)

I recently received Emails for my Shopify stores Momma Bears Creations and InkedWith regarding missing DMARC DNS entries. The Email was titled: Add a DMARC record to continue sending emails from your domain. An example of the Email is below Gmail and Yahoo have announced changes that require you to add a DMARC record on your domain before February 1, 2024 if you’d like to continue sending emails from a branded email address....

January 4, 2024 · 7 min · Scott

From Reactive to Proactive: Transforming Security with Tetragon

I previously blogged about Starboard and How to Install and Use Starboard to Protect Your Kubernetes Cluster. These articles were focused more on vulnerability and configuration management. Now, I wanted to focus my attention on runtime security observability using Tetragon. Getting Started With Tetragon The first step is to install it. The Tetragon website recommends using Helm 3 to deploy it so that’s what we’ll do. I’m deploying with just the default values for now...

December 18, 2023 · 12 min · Scott

From Vulnerability to Visibility: Demystifying Starboard Infrastructure Scan Reports

In previous posts,How to Install and Use Starboard to Protect Your Kubernetes Cluster and Enhancing Kubernetes Security and Compliance with Starboard Audit Reports: A Practical Guide, I started working through the different security reports available from the Starboard security scanner. The next step is to begin reviewing starboard Infrastructure Scans for security insights. Getting an Infrastructure Report After installing Starboard, I waited for it to run and generate all kinds of reports....

December 16, 2023 · 5 min · Scott